Enterprise cybersecurity is on the minds of executives around the globe, and the stakes are real: A single data breach triggers average losses of 1.1% in market value and 3.2% in sales growth. For an organization like Toyota, such an attack would cost billions. This scenario happened to Target Corp. After a breach leaked the…Continue Reading
Does your organization have best practices for how to use technology which include installing patches, computer based training and pushing out anti-virus updates? Does your firm have a threat detection strategy? Perhaps your firm utilizes a layered security approach and because you have never experienced a breach you are at peace with the security of…Continue Reading
Phishing scams are making the news again. This time a very believable scam targets Google users. If you think you know everything about protecting yourself, be aware that many tech savvy users were duped on this one. Here’s how they did it and how you can protect your business and employees. What is a Phishing…Continue Reading
Let’s face it, our lives are online nowadays. Whether it’s business information, bank accounts, bill pay, our car, our smart house, or any number of activities we complete online, just being on the Interwebs makes us all vulnerable to hacking. But there are ways you can avoid getting hacked, and whether you’re “techy” or not,…Continue Reading
Viruses, phishing scams, and spam are annoying on your personal computer. They can tap into your contacts, siphon off important information from bank accounts and credit card numbers, and be downright embarrassing when “you” email everyone you know about discount sunglasses or a bank account in the West Indies. But annoying quickly turns to catastrophe…Continue Reading
If there’s one thing that’s been proven in the tech world, it’s that scammers will stop at nothing to deceive and manipulate innocent computer users. One of the more recent scams comes from an unexpected source: the telephone. Learn to recognize suspicious scamming behavior so that you can protect your resources. Scamming: What and Why?…Continue Reading